DocumentCode
625927
Title
Securing broadcast against dishonest receivers
Author
Czap, Laszlo ; Prabhakaran, Vinod M. ; Diggavi, Suhas ; Fragouli, Christina
Author_Institution
EPFL, Lausanne, Switzerland
fYear
2013
fDate
7-9 June 2013
Firstpage
1
Lastpage
6
Abstract
Consider a sender, Alice, who wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. In [1], we assumed that Bob and Calvin provide honest feedback, and characterized the secure capacity region of the private messages under the requirement that Bob and Calvin do not learn each other´s message. In this paper, we assume that Bob (or Calvin) may provide dishonest feedback; or even control the input message distributions, as is commonly assumed in cryptography literature. We characterize the capacity region in the case of dishonest adversaries, as well as an achievable region for the case when the adversary has complete control on the distribution of the messages. We also design polynomial time protocols for both cases, that rely on the use of coding techniques to mix and secure the private messages. As a side result, we define an extended notion of semantic security for this problem and using a similar approach to [2], we show the equivalence of different security notions.
Keywords
cryptographic protocols; encoding; radio receivers; telecommunication security; broadcast security; coding techniques; cryptography literature; dishonest feedback; dishonest receivers; honest feedback; input message distributions; polynomial time protocols; private message security; secure capacity region; short public feedback; unreliable wireless broadcast transmissions; Encryption; Protocols; Receivers; Semantics; Silicon;
fLanguage
English
Publisher
ieee
Conference_Titel
Network Coding (NetCod), 2013 International Symposium on
Conference_Location
Calgary, AB
Print_ISBN
978-1-4799-0821-9
Type
conf
DOI
10.1109/NetCod.2013.6570819
Filename
6570819
Link To Document